Sie sind auf Seite 1von 14

SMK SUNGAI RUAN (2012)

Information
and
Communication
Technology
(ICT)
Chapter 1

: ICT and Society

Chapter 2

: Computer Systems

Chapter 3

: Computer Networks and


Communications

Chapter 4

: Multimedia

Chapter 5

: Programming

Chapter 6

: Information Systems

SMK SUNGAI RUAN 2012

28

SMK SUNGAI RUAN (2012)

Chapter 1 : ICT and Society


1. Computer
Generations

1st generation (1940 1956)


Huge, slow, expensive, unreliable
Presper Eckert & William Maunchly built ENIAC (vacuum tube)
Problem vacuum tube generates heat, burns out frequently

NOTES

2nd generation (1956 1963)


Uses transistors which were smaller than vacuum tubes,
Advantages : no need warm up time, consumed less energy,
generate less heat, faster & more reliable
Famous computer scientists: John Bardeen, Walter House
Brattain, William Shockley
3rd generation (1964 1971)
IBM 370 series - 1964.
CDC 7600 and B2500
Integrated circuit begins
Use silicon chips reliable, compact, cheaper
Hardware and software sold separately
First 256 bit RAM were introduced and was the basis for
development of 1K bit RAM
4th generation (1971 present)
Famous computer scientists: Steve Jobs (built the 1st Apple
computer), Bill Gates, Michael Dell
Silicone chips, microprocessor, storage devices were
invented
Computer became 100 times smaller than ENIAC
Gain in speed, reliability and storage capacity
Personal and software industry bloomed
5th generation (Present beyond)
Based on Artificial Intelligence (AI)
New hardware technology was introduce: Silicone chips,
Processor, Robotics, Virtual reality, Intelligent system,
Programs which translate languages

27

SMK SUNGAI RUAN (2012)


2. Positive impact
of ICT on the
society

6 positive impacts :
Faster communication speed
Lower communication cost
Reliable mode of communication
Effective sharing of information
Paperless environment

NOTES

Borderless communication

3. Negative impact 2 negative impacts :


of ICT on the
Social problems
society
Health problems

4. Why ethics and


law in
computing is
needed?

Respecting ownership not steal other peoples work either by


duplicating or distributing
Respecting privacy and confidentiality refraining oneself from
invading others privacy without permission
Respecting property do not tamper and change electronic
information

5. Intellectual
Property
protection

Patent for inventions : utility, design, plant patent, (protect


inventions and improvements)
Trademark for brand identity : Words, names, symbols, devices,
images (represent products, goods or services)
Copyright for material : Literary and artistic material, music, films,
sounds recording and road casts
Design for product appearance : particular lines, contours, colour,
shape, texture, ornamentations.

26

SMK SUNGAI RUAN (2012)


6. Methods of
authentications - a process where users verify their identity
authentications 2 types of authentications :
Biometric devices a device that translate personal characteristic
into digital code
Fingerprint recognition
Facial recognition
Hand geometry scanning
Iris scanning (the area near to the coloured area of the pupil)
Retinal scanning (the eyeball)
Voice recognition
Signature verification system

9. Data
manipulation

Insert to add new records in the file when new data are obtained.

Delete to remove a record from a file when it is no longer needed

Retrieve to obtain specific information from the tables in order to


refer or make changes the information.

Callback system checking system that authenticates the user


(commonly used in the bank operation and business transaction)
When booking the taxi service
Operator call and call back for confirm the service required
7. Methods of
verification

Sort To arrange the records according to ascending or descending


order based on a specific field.

Verification - the act of proving or disproving the correctness of a


system with respect to a certain formal specification

Filter to exclude unwanted records from being retrieved by using


certain condition or criteria in a query.

2 common methods:
User identification show passport, key-in user name & password,
show exam slip
Processed object swipe security card to enter building, police check
the drivers license to identify valid driver
8. Controversial
content

Update to correct inaccurate data and to change old data with


new data

Search To find specific records that fulfills the users requirements.

Pornography any form of media or material that depicts erotic


behavior and is intended to cause sexual excitement
Slander legal term for false and malicious statement

9. Internet
filtering

3 common methods :
Keyword blocking uses a list of banned words to filter access to the
site
Website / site blocking uses software to prevent access to any
sites on the list
Web rating system browser gain access to a certain level of ratings

25

SMK SUNGAI RUAN (2012)


7. Primary key
and foreign
key

Primary key these keys must not be null values, and it is unique. It
helps to avoid duplication

10. Cyber law acts


in Malaysia

Digital Signature Act 1997 secures electronic communications


especially on the internet
Computer Crimes Act 1997 gives protection against misuse of
computers and computer criminal activities

Foreign key the field that matches the primary key in another table.
It may have duplicate values.

Telemedicine Act 1997 Ensure only qualified medical practitioners can practice telemedicine
8. Phases of
System
Development

Analysis Phase
Developers will perform problem analysis by finding out the needs of
target users.
Developers also identify the input, process and output for the new
system.
Design Phase
Based on the needs of target users, the system developers will design
an Entity Relationship Diagram (ERD)

Communications and Multimedia Act 1998 ensures that


information is secure, network is reliable, and service is affordable
all over Malaysia
11. Computer
Crimes

Implementation Phase
Developers create database using database software.

Computer Fraud intention to take advantage or causing loss


(mainly monetarily basis)

Copyright Infringement involves illegal copy or reproduction of


copyright material by black market group

Testing Phase
The system will be tested by the target users in the Testing Phase If
there is any error detected; the system developers will fix the error.

Computer Theft unauthorized use of another persons property

Documentation Phase
Developers will produce the documents for the program

Computer Attack to disrupt the equipment of computer systems

Maintenance Phase monitor the system performance and make


changes when needed.

12. Computer
Security

3 types of maintenance:
Corrective maintenance to repair error in the system design.

Hardware Security used to protect the computer hardware

Software and Data Security used to protect software and the loss
of data files

Perfective maintenance to improve a computer program.


Preventive maintenance aim for future breakdowns and failures.

Network Security used to protect the network system

24

SMK SUNGAI RUAN (2012)


13. Security Threat

Malicious code
Virus a program that can pass in the malicious code to
other programs by modifying them
Trojan Horse a program which can perform useful and
unexpected action
Logic Bomb that goes off when a specific condition
occurs
Trapdoor or Backdoor a program that allows someone
to access the program with privileges
Worm a program that copies and spreads itself
through a network

4.

Hierarchy of
Data

Bits Bytes Fields Records Files Database


Bit smallest unit of data the computer can store. It is in binary digit
(1 and 0).
Byte 8 bits = 1 byte = 1 character.
Field smallest unit of meaning information in the database. It is
also unit of data consist of one or more characters. Example: field
that describe Name, Class, Address
Record collection of related fields. Example: Data about a student
[Name, StudentID, Age]

Hacker unauthorised person who access (hack) into computer


system

File collection of related records.

Natural and environmental threat flood, fire, earthquake

Database Structured collection of information on specific subjects.

Theft steal money, goods, information and resources


5.
14. Security Measures Data backup a program of file duplication. It is necessary so
that they can be recovered in case of an emergency

Benefits of
using database

Minimise data redundancy no need to repeat recording the same


data.
Data Integrity is assured changes of data in database will be
automatically for all files.

Cryptography process of hiding information by altering the


actual information into different representation.

Data can be shared allow ease of sharing data especially over the
network.

Antivirus program that protects a computer against viruses by


identifying and removing any computer viruses found in the
computer memory, storage or incoming email files.

Information can be easily accessed


6.

Anti-spyware program used to remove spyware


Firewall hardware or software which functions in a networked
environment to prevent some communications forbidden by the
security policies.
Screening router
Proxy gateway
Guard

Features of
Table stores a collection of information about specific topic.
table, query,
form and report Query request for a specific data from a database
Form interface to enter information.
Report summary of information from the database.

23

SMK SUNGAI RUAN (2012)

Chapter 6 : Information Systems

Human aspect refer to the user and also the intruder of a

1.

computer system.

Definition

Data raw material that are not organized, and has little value
Information processed data that are organized, meaningful and
useful.

Organisation self awareness aware of the people they


work with

Information System a set of related components that collects data,


processes data and provides information.

Organisation user self awareness provide employee with


adequate training and importance of security and control

2.

Component of
IS

Data raw inputs for information system such as number, image,


figure or sound

Individual user self awareness aware of software from


unreliable sources. Do not expose important information
to stranger.

Hardware set of physical equipment such as a processor, monitor,


keyboard and etc.
Software a set of computer programs that provide step by step
instruction

15. Security
Procedures

People individuals who use the hardware, software and its output
Procedures the set of instructions indicating the entire above
component in order to process information and generate the
expected outcome.
3.

Types of IS

Management Information System (MIS) provide regular


information about the daily activities of a business to the manager
Transaction Processing System (TPS) record business transaction
and keep track of the daily transaction in the database.
Decision Support System (DSS) provides managers with
information to make the best decisions. It also helps to analyse
information, recognize problems and making decisions.

Data Protection
Backup files
Detect virus and do cleanup
Warn others on virus attack
Detecting illegal access to systems
Tcpwrappers control access at the application level
rather than at socket level.
Tripwire detect and report on any changes in the
thousands of strategic system files.
Preventing illegal access to system
Preventing illegal access to root
Patch small updates to software

Executive Information System (EIS) helps top-level managements


to plan strategies. It is also used to forecast future trends.
Expert System (ES) store knowledge and make logical suggestions
for the user.

22

SMK SUNGAI RUAN (2012)

Chapter 2 : Computer Systems

6. Control
Structure

1. Computer
System

Hardware + Software + User

2. Computer
Hardware

Input Devices texts, graphics, audio, video

Sequence control linear execution of codes within the program (in


sequence order)
Selection control execution of codes involving decision making
based on the situation given. There will be decision symbol present
in the control

Output Devices texts, graphics, audio, animations, video


Repetition control execution of codes where the codes are
repeated while condition remains true. The arrowhead in the flow
chart usually will return the part of the decision to repeat the
process for true condition

Storage Devices Primary (RAM & ROM), Secondary (Magnetic,


Flash, Optical, ROM)
Processor the main brain in the system unit
3. Computer
Software

System Software Operating System (Linux, Window XP, Mac OS X,


Window Vista) & Utility program (Antivirus, File Manager, Screen
Saver, Diagnostic utility)
Application Software
Word Processing Corel Word Perfect, Microsoft Word,
Sun StarOffice Writer
Spreadsheet Corel Quattro Pro, Microsoft Excel,
Sun StarOffice Calc
Presentation Corel Presentations, Microsoft PowerPoint,
Sun StarOffice Impress
Graphics editing Adobe Photoshop CS2, CorelDraw,
Macromedia Freehand, GIMP

Input

Process

Coding phase the process of writing the solution using computer


programming language.
Programmer uses a program development tool which generates
or provides some or all codes.

Output

Testing and debugging phase the process of locating and


correcting of syntax and logic errors in a program.
3 types of errors
1. Syntax error caused by wrong spelling, case sensitive,
punctuation and wrong words in command.
2. Logic error expected output and actual output do no
match for any set of data.
3. Run-time error occurs while the program is running or
executing.

Storage

5. Machine cycle
diagram

Fetch
Store

Problem analysis phase


Programmer reviews and defines the problems
Identify the data input, process and output for the program
Program design phase
the programmer generates a top-down design model
Programmer writes the pseudo code for the program based on
the top-down design model
Programmer draws the flow chart that shows the data flow of
the program
Programmer also produces input and output user interfaces
base on the existing form

Software Suite collection of individual program sold as a


single package
4. Information
processing
diagram

7. Program
development
phase

Decode
Documentation phase the process of written description and
pseudo code of computer programs.

Execute

21

SMK SUNGAI RUAN (2012)


4.

Basic
element

Constant value never change at any time during the course of a


program

6. Data
representation

Variables value may change at any time during the course of a program
Data type
Integer: whole number (18, 79, 101, -6, -20)
Double: Numbers with decimal or contains fractional part (14.1, - 3.5,
200.10)
String: value that contains a sequence of characters (Ahmad,
sekolah)
Boolean: consist either True or False value
Currency: For currency use (RM, USD, Yen)
Operators symbol or notation that tells a computer to perform certain
actions or operation
Mathematical operators: plus (+), minus (), multiply (*), divide (/)
Relation operators: equal to (=), greater than (>), less than (<),
greater than or equal to (>=), less than or equal to (<=)
Logical operators: AND, OR, NOT

8 bits = 1 byte = 1 character

7. Character codes ASCII (American Standard Code for Information Interchange)


Pronounced as ASK-KEY
Most widely used coding system to represent data
Used mostly in PC and midrange server.
Uses 7 out of 8 bits in the character.
EBCDIC (Extended Binary Coded Decimal Interchange Code)
Pronounced as EB-SEE-DIC
Primarily used in mainframe computers and high-end server
Unicode
Support all the world language including Asian Language
Example: Chinese, Japanese, Korean
Uses 16 bits instead of the usual 8 bit per character
8. Component of
motherboard

Central Processing Unit (CPU) control the operations of the


computer. It interpret and carries basic instructions that operate a
computer. It have 2 subcomponent that is Control Unit (CU) and
Arithmetic Logic Unit (ALU).
Expansion Slots sockets where the circuit board or the adapter
card can be inserted into the motherboard.

5.

Flow Chart Terminator shows beginning or end of a program

RAM Slot slot where computer memory (RAM) is placed on the


computers motherboard.

Flow line and arrowhead shows connect symbols and indicate the
sequences of operation.

Ports the point where peripherals attaches to a system unit.


Serial port connect a device to the system unit by transmitting
data one bit at a time.
Parallel port connect devices by transferring information
more than one bit at a time.
Universal Serial Bus (USB) port socket on a computer or
peripheral devices into which a USB cable is plugged in. Can
connect up to 127 different peripherals together with a single
connector.
FireWire port connect multiple types of devices that requires
faster data transmission speeds. Can daisy-chain connect up to
63 devices to one FireWire port.

Input / output shows either an input operation or output operation


Process shows process to be carried out
Decision shows a decision to be made

Terminator

Input/output

Process

Decision

Connectors a connector joints a cable to a peripheral.

20

SMK SUNGAI RUAN (2012)


9.

User Interface

Chapter 5 : Programming

Command-line user interface


requires user to type commands or press special keys on the
key board to enter data and instructions that instruct the
operating system what to do. It has to be typed one line at a
time.

1.

Menu driven Interface


provides menus as means of entering commands.

Generations Low Level Programming Language


of
1GL (Machine Language) in binary codes and each statement are
programming corresponds to one machine action
language
2GL (Assembly Language) human readable notation, using symbolic
instructions codes that are meaning abbreviations or mnemonics
High Level Programming Language
3GL (Procedural language) uses a series of English-like words that
are closer to human language to write instructions.
Example: PASCAL, FORTRAN, BASIC, COBOL, C, C++

Graphical User Interface (GUI)


provides interface by means of clicking icon that represent
computer resources.
10. Function of
operating
system

4GL (Non-procedural language) enables user to access data in a


database. Limited to a very specific application
Example : SQL, NOMAD and FOCUS

Starting a computer warm boot, cold boot


Proving a user interface Command line, Menu Driven, GUI

5GL (Visual programming / Natural language) provides a visual or


graphics interface, allows people to interact with computers without
needing any specialised knowledge
Example: Prolog and Mercury

Managing data and programs


Managing memory
Configuring Devices
2.

Programming Structured programming (top-down design model) map out the


approaches
overall program structure into separate subsection from top to bottom
Example : Ada, Pascal and Fortran
Object oriented programming (OOP) combines data with functions
to create objects. The object has relationships with one another.
Example: Smalltalk, Java, Visual Basic, C++

3.

Translator

Compiler execute the program after translates the entire program


statement, if any errors found, it records them in the program-listing
file, it runs faster than interpreter
Example: COBOL, FORTRAN, C, C++
Interpreter interpret and execute program directly from its source
without compiling it first. Execute in real time when user execute it.
Example: BASIC, Logo and Smalltalk
Assembler computer program for translating assembly language into
machine language.
Example: MACRO-80 Assembler and Microsoft MASM

10

19

SMK SUNGAI RUAN (2012)


9. Screen Design
Principle

Chapter 3 : Computer Networks and Communications

Screen Design
how the multimedia program will look when it is displayed on the
computer screen.

1.

Computer
Network

LAN covers a small region of space, typically a single building


MAN is a collection of LANs with the same geographical area
(e.g. same city)

Contrast
the usage of different types of multimedia elements

WAN can be collections of LANs and / or MANs (e.g. a country


or even beyond the border)

Alignment
the arrangement of multimedia elements on the screen. For example,
graphics or text should be arranged at the most suitable position

2.

Network
Architecture

Simplicity
the simple and easy way of presenting the multimedia program

Client/Server Network in which the shared files and applications


are stored in the server but network user (client) can still store files
on their individual PCs.
Peer-to-Peer (P2P) network with all the nodes are acting as both
serves and clients

3.

Proximity
the concept of grouping a similar or related element

Network
Topology

Bus Topology main physical pathway or central cable where all


other devices are connected to it
Backbone

Emphasis
to creating the focus point on the screen

Ring Topology all computers and other devices are connected in a


loop (or a circle)

Repetition
repeating the same texture, colour, size of font and style in the
multimedia program.

Node
Node

Node

Node

Node

Star Topology a central host (usually a hub or a switch) which acts


as the centre and all nodes connect to the host.
Node

Node
HUB

Node

18

Node

11

SMK SUNGAI RUAN (2012)


4.

Network
Standard

802.3 Ethernet LAN: physical cabling, data is transmitted through


the cable CSMA/CD, only one device on the network can be
transmitted at a time

7. Multimedia
production
team

802.7 Broadband LAN: allow simultaneous multiple transmissions


or signals using different communications channels at the same
time

Project Manager
Define the scope of the project and discuss with the client
Search for financial resources, equipment and facilities
Coordinate the production team
Subject Matter Expert
Do the research on the content of a multimedia program
Provide content for the multimedia content

802.8 Fiber-Optic LAN and MAN


Graphics Artist
Develop the graphic elements of the program such as background,
buttons, photos collages, 3D objects, logo and animation.

802.11 Wireless LAN : communication between a wireless computer or client, uses 2.4 GHz frequency to transmit data up to 2
Mbps

5.

Protocols

Audio-Video Technician
Record voice, capture, edit and digitize the video

HTTP: used to access, send and receive Hypertext Markup


Language files (HTML) on the internet

Instructional Designer
Decide on the best educational strategies and practices to
present the information.

SMTP: used for transferring e-mail between computers


FTP: for allowing files to be copies between devices

Programmer
Write the program code lines or scripts using the authoring tool

TCP: ensures the delivery of information packets across network


IP: providing logical addressing called IP address to route
information between network

6.

Network
Communication
Technologies

Internet world largest computer network which connect millions


computers all over the world
Intranet internal network that uses Internet technologies. It is a
small version of the internet that exist within an organization, make
company information accessible to employees and facilitate
working in groups
Extranet private network that uses Internet protocols to securely
share part of a businesss information with authorised parties

7.

Transmission
medium

Physical transmission medium usually uses wires (twistedpair :


UTP & STP, coaxial cable & fiber optic)

8. Multimedia
Production
Phases

Analysis developers interview the clients to find out their needs and
write the problem statement and a proposal.
Design developer design a flow chart and storyboard
Implementation developers convert a design plan such as storyboard into a multimedia project
Testing to ensure the program runs correctly without errors.
Evaluation focuses on overall presentation and effectiveness of the
multimedia.
Publishing package the presentation/project multimedia
using suitable software

Wireless transmission medium uses air to transmit data


(radiowaves, microwaves & infrared)

12

17

SMK SUNGAI RUAN (2012)


5. Web editor

Chapter 4 : Multimedia

What You See Is What You Get (WYSIWYG)


Provide an editing interface that shows how the pages will be
displayed in web browser.
More user friendly
No junk HTML
No HTML knowledge needed
Easy to insert a specific tag
Easy to visualize the design
E.g.: Microsoft FrontPage, Macromedia Dreamweaver
Text-based
An editor where you work with HTML tags to create a web page.
Less user friendly
No junk HTML
Requires HTML knowledge
Difficult to insert a specific tag
Cannot visualize the design
E.g.: Notepad, PSPad

6. User Interface
Principle

1. Definition of
Multimedia

Presentation of information by using a combination of text, audio,


graphics, video and animation.

2. Interactivity

Linear interactivity the user is a passive receiver. User cannot


control over the multimedia content. Only one way
communication
Non-linear interactivity the user is an active receiver. User can
control over the multimedia content. Two way communication
occurs

3. Medium of delivery Web-based


Limited in picture size and low resolution video
Information can be changed, damaged or deleted by
irresponsible individuals
Information can be updated easily and cheaper
Its cheaper

- User interface is a way a computer program communicates with the


person who is using it.

CD-based
Can store high end multimedia elements
Information permanently stored and are not changeable
Information can be outdated

Consistency the interface design is in harmony and same applied to


all screen in a software program.
Clarity clearness of labels on all icons
Context relevant to a particular title and ideas

4. Multimedia
Elements and File
formats

Navigation user can move around the menu, help files or other
screens
Search enables user to search keywords or glossary
Personalisation user can make their own personal or individual
learning
Learnability system provides support information and help files to
make system easy to understand

Examples of file formats for multimedia elements


Elements

File Format

Text

*doc, *.txt, *.rtf

Graphic

*.jpg, *.gif, *.tiff, *.bmp, *.png, *.psd

Animation

*.swf, *.gif, *.swi

Audio

*.wav, *.midi, *.aif/aiff, *.au, *.wma, *.mp3

Video

*.avi, *.mov, *.mpeg, *.wmv

Flexibility user has the authority to navigate through all the sections

16

13

SMK SUNGAI RUAN (2012)


5.

Editing Software Type of editing software (editor)


(editor) for
Text editor
multimedia
Graphic editor
Animation editor
Audio editor
Video editor

6 Authoring Tool
Concept

Authoring Tool a program to write multimedia application


3 concepts of multimedia authoring tools :
Time frame
Icon
Card
Time Frame
Multimedia elements are presented and organized along a
time line
A timeline consists of layers which span several frames
Example : Flash, Director

Text editor used to edit plain text


Graphic editor used to edit images, draws/illustrate pictures/
objects
Animation editor used for producing 2D, 3D, special effects and
animation for the web
Audio editor used for voice recording, producing music and special sound effects

Icon
Multimedia elements are organized in a structural framework
Users can present visually a logical flow of events by dragging
icons from an icon menu
Example : Authorware, IconAuthor

Video editor used to edit video


Card
Multimedia elements are organized as pages in a book or a
stack of cards
Example : ToolBook, HyperCard, SuperCard

Example of editing software :


Elements
Editing Software (editor)
Text

Notepad, Microsoft Word

Graphic

Microsoft Paint, Corel Draw,


Adobe Photoshop

Animation

Macromedia Flash (2D), Ulead GIF Animator

Audio

Sound Recorder, Sony Sound Forge

Video

Adobe Premiere, Pinnacle Studio

14

15

Das könnte Ihnen auch gefallen